p3: toward privacy-preserving photo sharing · p3 algorithm: why it works exploiting the...
TRANSCRIPT
![Page 1: P3: Toward Privacy-Preserving Photo Sharing · P3 Algorithm: Why It Works Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “ A Mathematical Analysis](https://reader034.vdocuments.site/reader034/viewer/2022042315/5f0400e57e708231d40bd6b3/html5/thumbnails/1.jpg)
P3: Toward Privacy-Preserving Photo Sharing
Moo-Ryong Ra, Ramesh Govindan, and Antonio Ortega
Networked Systems Laboratory & Signal and Image Processing Institute
University of Southern California
![Page 2: P3: Toward Privacy-Preserving Photo Sharing · P3 Algorithm: Why It Works Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “ A Mathematical Analysis](https://reader034.vdocuments.site/reader034/viewer/2022042315/5f0400e57e708231d40bd6b3/html5/thumbnails/2.jpg)
2
Cloud-based Photo Sharing Services (PSPs)
PSPs
However, there are serious privacy concerns
![Page 3: P3: Toward Privacy-Preserving Photo Sharing · P3 Algorithm: Why It Works Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “ A Mathematical Analysis](https://reader034.vdocuments.site/reader034/viewer/2022042315/5f0400e57e708231d40bd6b3/html5/thumbnails/3.jpg)
3
The Case of Privacy Infringement by PSPs
PSPs
Today we have no choice but to trust PSPs
Alice must be interested in this handsome guy.
Image link is open to public.
Alice
Friends
Link Leakage
Mining
![Page 4: P3: Toward Privacy-Preserving Photo Sharing · P3 Algorithm: Why It Works Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “ A Mathematical Analysis](https://reader034.vdocuments.site/reader034/viewer/2022042315/5f0400e57e708231d40bd6b3/html5/thumbnails/4.jpg)
4
These Privacy Concerns Are Real
NBC News, December 19, 2012
CNN.com, August 9, 2012
Wall Street Journal, June 8, 2011
New York Times, August 15, 2012
![Page 5: P3: Toward Privacy-Preserving Photo Sharing · P3 Algorithm: Why It Works Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “ A Mathematical Analysis](https://reader034.vdocuments.site/reader034/viewer/2022042315/5f0400e57e708231d40bd6b3/html5/thumbnails/5.jpg)
5
Cloud-side Processing for Mobile Devices
Friends
Alice
Cloud-side processing is often useful for mobile devices in many ways
![Page 6: P3: Toward Privacy-Preserving Photo Sharing · P3 Algorithm: Why It Works Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “ A Mathematical Analysis](https://reader034.vdocuments.site/reader034/viewer/2022042315/5f0400e57e708231d40bd6b3/html5/thumbnails/6.jpg)
Question: Can we protect users’ privacy while still performing
cloud-side image transformation?
![Page 7: P3: Toward Privacy-Preserving Photo Sharing · P3 Algorithm: Why It Works Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “ A Mathematical Analysis](https://reader034.vdocuments.site/reader034/viewer/2022042315/5f0400e57e708231d40bd6b3/html5/thumbnails/7.jpg)
7
Your Friends
Full Encryption?
You
We will lose benefits provided by cloud-side processing
![Page 8: P3: Toward Privacy-Preserving Photo Sharing · P3 Algorithm: Why It Works Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “ A Mathematical Analysis](https://reader034.vdocuments.site/reader034/viewer/2022042315/5f0400e57e708231d40bd6b3/html5/thumbnails/8.jpg)
8
Goals, Threat Model, and Assumptions
Privacy and Attack Model • Unauthorized access • Algorithmic recognition
PSPs
We trust • Mobile devices’ HW and SW
We don’t trust • Eavesdropper on the network • “Honest-but-curious” PSPs
Preserving users’ privacy with cloud-side processing
![Page 9: P3: Toward Privacy-Preserving Photo Sharing · P3 Algorithm: Why It Works Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “ A Mathematical Analysis](https://reader034.vdocuments.site/reader034/viewer/2022042315/5f0400e57e708231d40bd6b3/html5/thumbnails/9.jpg)
9
Bob
Enhancement Layer (JPEG)
High-level Description of Our Approach
+
PSPs
Alice
SECRET PART
PUBLIC PART
Most Significant Bits
Least Significant Bits
![Page 10: P3: Toward Privacy-Preserving Photo Sharing · P3 Algorithm: Why It Works Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “ A Mathematical Analysis](https://reader034.vdocuments.site/reader034/viewer/2022042315/5f0400e57e708231d40bd6b3/html5/thumbnails/10.jpg)
10
Bob
P3 Requirements
PSPs
Alice Privacy
Storage
Lightweight Processing
Transparent Deployment
Cloud-side Processing
Standard Compliancy
Our algorithm and system, collectively called P3, realizes this capability
![Page 11: P3: Toward Privacy-Preserving Photo Sharing · P3 Algorithm: Why It Works Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “ A Mathematical Analysis](https://reader034.vdocuments.site/reader034/viewer/2022042315/5f0400e57e708231d40bd6b3/html5/thumbnails/11.jpg)
11
P3 Algorithm: Why It Works
Exploiting the characteristics of DCT coefficients in JPEG.
Lam and Goodman, “A Mathematical Analysis of the DCT Coefficient Distributions for Images”, ITIP 2000
Sparseness Sign Magnitude
More Energy
P3 exploits all three facts to make a public part much less informative
![Page 12: P3: Toward Privacy-Preserving Photo Sharing · P3 Algorithm: Why It Works Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “ A Mathematical Analysis](https://reader034.vdocuments.site/reader034/viewer/2022042315/5f0400e57e708231d40bd6b3/html5/thumbnails/12.jpg)
12
AC coefficients
P3 Algorithm: How the encryption works
Secret Original Image
DC Coefficients
Quantized Coefficients
Public
Values <= T
Values > T
T
-T
![Page 13: P3: Toward Privacy-Preserving Photo Sharing · P3 Algorithm: Why It Works Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “ A Mathematical Analysis](https://reader034.vdocuments.site/reader034/viewer/2022042315/5f0400e57e708231d40bd6b3/html5/thumbnails/13.jpg)
13
Threshold vs. Storage Trade-off
INRIA dataset (1491 images)
P3
![Page 14: P3: Toward Privacy-Preserving Photo Sharing · P3 Algorithm: Why It Works Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “ A Mathematical Analysis](https://reader034.vdocuments.site/reader034/viewer/2022042315/5f0400e57e708231d40bd6b3/html5/thumbnails/14.jpg)
14
Public Part (T=20)
Privacy: What is exposed?
Public Part (T=15) Public Part (T=10) Public Part (T=5) Public Part (T=1) Original Secret Part (T=1) Secret Part (T=5) Secret Part (T=10) Secret Part (T=15) Secret Part (T=20)
![Page 15: P3: Toward Privacy-Preserving Photo Sharing · P3 Algorithm: Why It Works Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “ A Mathematical Analysis](https://reader034.vdocuments.site/reader034/viewer/2022042315/5f0400e57e708231d40bd6b3/html5/thumbnails/15.jpg)
15
Cloud-side Processing
(A)
P3 Decryption Challenge
P3 Encrypt
Public Part (P)
P3 Decrypt Cloud-side
Processing
f
Secret Part (S)
Bob Alice
We need to perform careful analysis since P3 encryption hides sign information.
(Y)
Challenge: Given S and f(P), can we get f(Y)?
![Page 16: P3: Toward Privacy-Preserving Photo Sharing · P3 Algorithm: Why It Works Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “ A Mathematical Analysis](https://reader034.vdocuments.site/reader034/viewer/2022042315/5f0400e57e708231d40bd6b3/html5/thumbnails/16.jpg)
16
Addressing P3 Decryption Challenge
P3 can handle ANY linear processing
Original Image
(Y)
Secret (S)
Public (P)
Comp (C)
Challenge: Given S and f(P), can we get f(Y)?
Analysis Result: C can be derived from S
Scaling Cropping Smoothing Blending Sharpening
![Page 17: P3: Toward Privacy-Preserving Photo Sharing · P3 Algorithm: Why It Works Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “ A Mathematical Analysis](https://reader034.vdocuments.site/reader034/viewer/2022042315/5f0400e57e708231d40bd6b3/html5/thumbnails/17.jpg)
17
Storage Service
P3 System Architecture
Sender Recipients
PSPs
P3 Trusted On-device Proxy
PSPs’ Apps
P3 can be implemented with existing PSPs without causing infrastructure changes
PSPs’ Apps
Encrypted secret parts
Public parts
P3 encryption P3 decryption
![Page 18: P3: Toward Privacy-Preserving Photo Sharing · P3 Algorithm: Why It Works Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “ A Mathematical Analysis](https://reader034.vdocuments.site/reader034/viewer/2022042315/5f0400e57e708231d40bd6b3/html5/thumbnails/18.jpg)
18
Prototype on Android Phone
Category Average Stdev
P3 Encryption 152.7 ms 20.87
P3 Decryption 191.85 ms 24.83
With P3 Without P3
P3 is practical and can be added to Facebook
![Page 19: P3: Toward Privacy-Preserving Photo Sharing · P3 Algorithm: Why It Works Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “ A Mathematical Analysis](https://reader034.vdocuments.site/reader034/viewer/2022042315/5f0400e57e708231d40bd6b3/html5/thumbnails/19.jpg)
19
Evaluating Privacy
P3 preserves privacy against algorithmic attacks
Objective metric
PSNR
Computer vision algorithms
SIFT feature detection
Edge detection: Canny
Face detection: Haar
Face recognition: EigenFace
![Page 20: P3: Toward Privacy-Preserving Photo Sharing · P3 Algorithm: Why It Works Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “ A Mathematical Analysis](https://reader034.vdocuments.site/reader034/viewer/2022042315/5f0400e57e708231d40bd6b3/html5/thumbnails/20.jpg)
22
4 probing (testing) sets
2 distance metrics (Euclidean, MahCosine)
Different P3 thresholds from 1 to 100
Public parts as a training set
Results: Face Recognition
EigenFace [Turk et al. 1991] with the Color FERET database CSU’s face recognition evaluation system
![Page 21: P3: Toward Privacy-Preserving Photo Sharing · P3 Algorithm: Why It Works Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “ A Mathematical Analysis](https://reader034.vdocuments.site/reader034/viewer/2022042315/5f0400e57e708231d40bd6b3/html5/thumbnails/21.jpg)
23
P3 Successfully Breaks Face Recognition
Face recognition doesn’t work
![Page 22: P3: Toward Privacy-Preserving Photo Sharing · P3 Algorithm: Why It Works Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “ A Mathematical Analysis](https://reader034.vdocuments.site/reader034/viewer/2022042315/5f0400e57e708231d40bd6b3/html5/thumbnails/22.jpg)
24
Summary and Contributions
Our algorithm and system, collectively called P3, provides privacy-preserving photo sharing
Propose a novel photo encryption/decryption algorithm.
Transparent system design that can work with existing PSPs.
A complete prototype and extensive privacy evaluation using computer vision-based recognition algorithms.